A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1 |
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14 |
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28 |
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point Pradeep Kumar Mishra and Palash Sarkar 41 |
Fast Arithmetic on Jacobians of Picard Curves Stephane Flon and Roger Oyono 55 |
Undeniable Signatures Based on Characters: How to Sign with One Bit Jean Monnerat and Serge Vaudenay 69 |
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures Ron Steinfeld, Huaxiong Wang, and Josef Pieprzyk 86 |
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model Huafei Zhu 101 |
Constant Round Authenticated Group Key Agreement via Distributed Computation Emmanuel Bresson and Dario Catalano 115 |
Efficient ID-based Group Key Agreement with Bilinear Maps Kyu Young Choi, Jung Yeon Hwang, and Dong Hoon Lee 130 |
New Security Results on Encrypted Key Exchange Emmanuel Bresson, Olivier Chevassut, and David Pointcheval 145 |
New Results on the Hardness of Diffie-Hellman Bits Maria Isabel Gonzalez Vasco, Mats Naeslung, and Igor E. Shparlinski 159 |
Short Exponent Diffie-Hellman Problems Takeshi Koshiba and Kaoru Kurosawa 173 |
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups Benoit Libert and Jean-Jacques Quisquater 187 |
Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2 Nicolas T. Courtois 201 |
Secret Exponent Attacks on RSA-type Schemes with Moduli N=Prq Alexander May 218 |
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures" Reihaneh Safavi-Naini, Luke McAven, and Moti Yung 231 |
From Digital Signature to ID-based Identification/Signature Kaoru Kurosawa and Swee-Huay Heng 248 |
Identity-Based Threshold Decryption Joonsang Baek and Yuliang Zheng 262 |
An Efficient Signature Scheme from Bilinear Pairings and Its Applications Fangguo Zhang, Reihaneh Safavi-Naini, and Willy Susilo 277 |
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications Ryotaro Hayashi, Tatsuaki Okamoto, and Keisuke Tanaka 291 |
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation Jintai Ding 305 |
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability Jun Furukawa 319 |
A Point Compression Method for Elliptic Curves Defined over GF(2n) Brian King 333 |
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny Toru Akishita and Tsuyoshi Takagi 346 |
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Rui Zhang, Goichiro Hanaoka, Junji Shikata, and Hideki Imai 360 |
QuasiModo: Efficient Certificate Validation and Revocation Farid F. Elwailly, Craig Gentry, and Zulfikar Ramzan 375 |
A Distributed Online Certificate Status Protocol with a Single Public Key Satoshi Koga and Kouichi Sakurai 389 |
A First Approach to Provide Anonymity in Attribute Certificates Vicente Benjumea, Javier Lopez, Jose A. Montenegro, and Jose M. Troya 402 |
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups Igor E. Shparlinski and Arne Winterhof 416 |
Cryptographic Randomized Response Techniques Andris Ambainis, Markus Jakobsson, and Helger Lipmaa 425 |
A Correct, Private, and Efficient Mix Network Kun Peng, Colin Boyd, Ed Dawson, and Kapali Viswanathan 439 |
Author Index 455 |
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1 |
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14 |
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28 |